Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
103 Cards in this Set
- Front
- Back
SDLC
|
Planning, Analysis, Design, Development, Testing, Implementation, Maintenance
|
|
Planning
|
select system project, assess feasibility, produce project plan (select team members, develop schedule, select methodology)
|
|
Analysis
|
collect/analyze data (study the current system), determine business requirements
|
|
Design
|
describe desired features and operations of the system
|
|
Development
|
transforming designs into the actual system
|
|
Maintenance
|
performing changes, corrections, additions, and upgrades to ensure the system continues to meet business goals, most expensive part
|
|
Waterfall methodology
|
each phase is performed sequentially from planning through implementation and maintenance; inflexible, expensive and requires rigid adherence to the sequentially based steps
|
|
Agile methodologies
|
quick and flexible, small projects delivered quickly and frequently, daily collaboration with users
|
|
Primary principles an organization should follow for successful agile software development
|
slash the budget, if it doesn't work, kill it, keep requirements to a minimum, test and deliver frequently, assign non-IT executives to software projects
|
|
Rapid Application Development
|
Emphasizes user involvement by constructing working prototypes of a system to accelerate the systems development project
|
|
Extreme programming
|
Breaks a project into tiny phases, developers cannot continue on to the next phase until the first is complete
|
|
Feasibility Assessment
|
Technical, economical, legal, operational, scheduling
|
|
Conversion
|
Direct, parallel, pilot, phased
|
|
Sequential Flowcharting
|
one step is completed followed by a next step and so on
|
|
Selection Flowcharting
|
the answer to a question causes a branch in the process; ex. if-then-else, if-then-null-else, nested-if-then-else
|
|
Repetition Flowcharting
|
allows one or more actions to be repeated until a condition is met, loop/iteration
|
|
Compiler
|
translates whole program, translate once and then it can run over and over again, fast because it doesn't have to keep translating, must install machine-level on user's machine before program runs
|
|
Interpreter
|
converts code to machine language statement-by-statement just before execution, translation done every time so it makes it slower
|
|
Two level approach
|
uses both a compiler and an interpreter, translates whole program, then statement by statement
|
|
Syntax error
|
incorrect use of language's defined set of key terms and operators, usually caught by compiler or interpreter
|
|
Run-time (logic) error
|
does not violate specific syntax but logically incorrect, found when running
|
|
3 types of error detection
|
visual code examination, debugger step-through, test cases
|
|
JVM (Java Virtual Machines)
|
last-step interpreter that is specific to each machine type in each computer's browser
|
|
Java Applet
|
uses 2-level approach, uses JVM in browser, compiled into bytecode, stored as a separate file
|
|
Java Script
|
interpreted at run time, entire script embedded in HTML document
|
|
High-level language
|
uses defined grammar and specific command words, makes it easier to write code
|
|
Low-level language
|
generally written to interface with a specific type of hardware, such as a specific computer processor, tedious to write because instructions are very detailed and specific
|
|
business wikis
|
collaborative web pages that allow users to edit documents, share ideas, or monitor the status of a project
|
|
collaboration system
|
an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information
|
|
content management system
|
provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment
|
|
core competency
|
an organization's key strength or business function that it does better than any of its competitors
|
|
digital asset management system
|
though similar to document management, DAM generally works with binary rather than text files, such as multimedia file types
|
|
Digital Darwinism
|
organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction
|
|
digital divide
|
when those with access to technology have great advantages over those without access to technology
|
|
disruptive technology
|
a new way of doing things that initially does not meet the needs of existing customers
|
|
document management system
|
supports the electronic capturing, storage, distribution, archival, and accessing of documents
|
|
explicit knowledge
|
consists of anything that can be documented, archived, and codified, often with the help of IT
|
|
Groupware
|
software that supports team interaction and dynamics including calendaring, scheduling, and videoconferencing
|
|
hypertext transport protocol
|
the internet standard that supports the exchange of information on the WWW
|
|
knowledge management
|
involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions
|
|
protocol
|
a standard that specifies the format of data as well as the rules to be followed during transmission
|
|
semantic Web
|
an evolving extension of the WWW in which web content can be expressed not only in natural language, but also in a format that can be read and used by software agents, thus permitting them to find, share, and integrate information more easily
|
|
service-oriented architecture
|
a collection of services that communicate with each other, for example, passing data from one service to another or coordinating an activity between one or more services
|
|
sustaining technology
|
produces an improved product customers are eager to buy, such as a faster car or larger hard drive
|
|
tacit knowledge
|
the knowledge contained in people's heads
|
|
videoconference
|
a set of interactive telecommunication technologies that allow two or more locations to interact via two-way video and audio transmissions simultaneously
|
|
Web 2.0
|
a set of economic, social, and technology trends that collectively form the basis for the next generation of the Internet - a more mature, distinctive medium characterized by user participation, openness, and network effects
|
|
web content management systems
|
adds an additional layer to document and digital asset management that enables publishing content both to intranets and to public websites
|
|
wikis
|
web-based tools that make it easy for users to add, remove, and change online content
|
|
workflow management systems
|
facilitates the automation and management of business processes and controls the movement of work through the business process
|
|
World Wide Web
|
a global hypertext system that uses the internet as its transport mechanism
|
|
application service provider
|
a company that offers an organization access over the Internet to systems and related services that would otherwise have to be located in personal or organizational computers
|
|
brick-and-mortar business
|
business that operates in a physical store without an internet presence
|
|
business-to-business (B2B)
|
applies to businesses buying from and selling to each other over the internet
|
|
business-to-consumer (B2C)
|
applies to any business that sells its products or services to consumers over the internet
|
|
clickstream data
|
exact patterm of a consumer's navigation through a site
|
|
click-through
|
a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser
|
|
Consumer-to-business
|
applies to any consumer that sells to a business over the internet
|
|
consumer-to-consumer
|
applies to sites primarily offering goods and services to assist customers interacting with each other over the internet
|
|
content provider
|
companies that use the internet to distribute copyrighted content
|
|
E-business
|
the conducting of business on the internet, not only buying and selling, but also serving customers and collaborating with business partners
|
|
ecommerce
|
the buying and selling of goods and services over the internet
|
|
e-procurement
|
the B2B purchase and sale of supplies and services over the internet
|
|
e-shop
|
a version of a retail store where customers can shop at any hour of the day without leaving their home or office
|
|
extranet
|
an intranet that is available to strategic allies (such as customers, suppliers and partners)
|
|
interactivity
|
measures the visitor interactions with the target ad
|
|
intermediaries
|
agent, software, or business that brings buyers and sellers together to provide a trading infrastructure to enhance ebusiness
|
|
internet service provider
|
a company that provides individuals and other companies access to the internet along with additional related services, such as website building
|
|
intranet
|
an internalized portion of the internet, protected from outside access, that allows an organization to provide access to information and application software to only its employees
|
|
kiosk
|
publicly accessible computer system that has been set up to allow interactive information browsing
|
|
mobile commerce (m-commerce)
|
the ability to purchase goods and services through a wireless Internet-enabled device
|
|
Online brokers
|
intermediaries between buyers and sellers of goods and sellers
|
|
online service provider
|
offers an extensive array of unique services such as its own version of a web browser
|
|
portal
|
a website that offers a broad array of resources and services, such as email, online discussion groups, search engines, and online shopping malls
|
|
pure-play (virtual) business
|
a business that operates on the internet only without a physical store
|
|
service level agreements
|
defines the specific responsibilities of the service provider and sets the customer expectations
|
|
web mashup
|
a website or web application that uses content from more than one source to create a completely new service
|
|
wireless internet service provider (WISP)
|
an ISP that allows subscribers to connect to a server at designated hotspots or access points using a wireless connection
|
|
authentication
|
a method for confirming users' identities
|
|
authorization
|
the process of giving someone permission to do or have something
|
|
Biometrics
|
the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
|
|
content filtering
|
occurs when organizations use software that filters content to prevent the transmission of unauthorized information
|
|
denial-of-service attack
|
floods a website with so many requests for service that it slows down or crashes the site
|
|
encryption
|
scrambles information into an alternative form that requires a key or password to decrypt the information
|
|
firewall
|
hardware/software that guards a private network by analyzing the information leaving and entering the network
|
|
hacker
|
people very knowledgeable about computers who use their knowledge to invade other people's computers
|
|
hoaxes
|
attack computer systems by transmitting a virus hoax, with a real virus attached
|
|
information security
|
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
|
|
insider
|
legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
|
|
intrusion detection software
|
searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm
|
|
malicious code
|
includes a variety of threats such as viruses, worms, and Trojan horses
|
|
packet tampering
|
altering the contents of packets as they travel over the internet or altering data on computer disks after penetrating a network
|
|
phishing
|
technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email
|
|
smart card
|
a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing
|
|
sniffer
|
a program or device that can monitor data traveling over a network
|
|
social engineering
|
using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
|
|
spoofing
|
the forging of the return address on an email so that the email message appears to come from someone other than the actual sender
|
|
spyware
|
software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about
|
|
token
|
small electronic devices that change user passwords automatically
|
|
trojan-horse virus
|
hides inside other software, usually as an attachment or a downloadable file
|
|
virus
|
software written with malicious intent to cause annoyance or damage
|
|
worm
|
a type of virus that spreads itself, not only from file to file, but also from computer to computer
|
|
bytecode
|
mostly translated computer code made available to users for download
|